102 research outputs found
AN EMPIRICAL TEST FOR THE EXPANSION-CONTROL MODEL FOR MANAGING END-USER COMPUTING
The purpose of this research is to determine if the expansion-control model as proposed, adapted, and refined (Munro and Huff 1985; Munro, Huff and Moore 1987) is useful for understanding and predicting changes in EUC management strategy over time. The long-term interest is not so much in understanding the specific problem of managing end-user computing as in understanding the general problem of managing new information technology in organizations. A field study was conducted with eighteen large firms in manufacturing and services to review their experience with EUC management over a nine year period. As predicted, most firms took a hands-off approach to EUC management during the initiation phase and evolved toward a balance between control and slack by 1987. However, changes in firms\u27 EUC management strategy over time were more complex than predicted. In addition, the expansion and control constructs were not as independent as previously thought. The interaction between the two variables appears to be related, at least in part, to time and the stage of diffusion. The research suggests that current models of EUC management (and thus organizational learning about information technology) may be too simplistic. Suggestions for developing more general models of the process are offered
End User Computing and Information Security: a Retrospective Look at the De-centralisation of Data Processing and Emerging Organisational Information Risk
Information security assured on centralised systems through application of principles previously established for paper-based systems. The advent of personal computing and distributed computing potentially turned that model upside down. It seems that the eagerness of organisations for encouraging technology (Availability part of the CIA acronym) seemed to take precedence over the finer meaning of Confidentiality and Integrity, in spite of (in the UK, at least) changes to legislation.
The huge increase in portable data storage capacities ensured that what may have been perceived as a minor irritant in the 1980s became a potential nightmare scenario by 2007, which caused two government reports to report “systemic failure”. This paper looks at the development of end-user computing, and suggests that the problem occurred because of a lack of information risk assessment over many year
Recommended from our members
End user computing: A critique of the empirical literature
This manuscript is an attempt to provide the reader with synopses of relevant research pertaining to the EUC literature. References included in [this paper for review address some of the most germane topics in IT management. With the recently increasing recognition that end users are a major player in the acquisition, use, and management of computer resources in business organizations, a host of researchers have examined diverse changes that have occurred in the computing environment in order to explore various issues associated with enduser computing (EUC). This paper suggests that past EUC research has extensively examined the effects of MIS department role, EUC technologies, and end users\u27personal variables, with insufficient emphasis upon the linkage of management strategies and of university training to EUC activities
End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk
Information security assured on centralised systems through application of principles previously established for paper-based systems. The advent of personal computing and distributed computing potentially turned that model upside down. It seems that the eagerness of organisations for encouraging technology (Availability part of the CIA acronym) seemed to take precedence over the finer meaning of Confidentiality and Integrity, in spite of (in the UK, at least) changes to legislation. The huge increase in portable data storage capacities ensured that what may have been perceived as a minor irritant in the 1980s became a potential nightmare scenario by 2007, which caused two government reports to report “systemic failure”. This paper looks at the development of end-user computing, and suggests that the problem occurred because of a lack of information risk assessment over many year
Champagne training on a beer budget
[Abstract]: When confronted by rapidly escalating costs for End User Computing (EUC) training and support, the Gold Coast City Council (GCCC) - the local government authority for Australia’s premier tourist destination - took a proactive stance by adopting a low-cost strategy. This strategy has now been in place for about six years and, as shown in this case study, is reaping rewards in terms of productivity increases and technology diffusion. After identifying an appropriate theoretical perspective for the study, this paper describes the EUC training approach taken at GCCC, and investigates its impact on the productivity of the 1500 person workforce. Both the trainees and the trainers were surveyed to evaluate fully this low-cost strategy. Related social issues of empowering the stakeholders are examined and recommendations are made to ensure that this approach will continue to provide champagne training on a beer budget
Can Computers Motivate? The Association Between End User Computing Levels, Job Motivation, And Job Core Characteristics: A Field Study
While end user computing (EUC) has been studied from the standpoint of classification and management, less attention has been placed on how the utilization of the technology impacts on users jobs. This study proposes that differing levels of EUC activity will be associated with differing levels of job characteristics and computer related job outcomes. The study focused on the jobs of 121 middle managers and professional workers enrolled in an MBA program at a southeastern university. The study finds that with successive levels of complexity in EUC utilization, there are corresponding increases in the levels of users' experiencing of job core characteristics
Investigating the Link Between Multinational Strategy-Structure and Management of End User Computing
The goal of this paper is to investigate the link between existing organization strategy-structure and the management of end user computing, in a multinational setting. This paper attempts to answer the question: Is there any consistency between the multinational strategy-structure and its end user computing strategy? The factors influencing the degree of fit between the organization strategy and end-user strategy will also be identified. Recommendations based on the preliminary investigation are made for tackling some of the problem areas. This preliminary investigation is followed by a detailed survey of multinational corporations. Though the results from the survey are not currently available, the initial results from the case studies in this research are presented and discussed
Key issues in information system management: The DoD perspective
The article of record as published may be found at https://doi.org/10.1080/0743017930840558
Pragmatic data modelling and design for end users
Many people are dependent on desktop end user tools such as spreadsheets and databases to manage their data. While they may have the technical skills to set up data repositories, many end users lack the analysis skills to design data models which reflect their often deceptively complex requirements. We advocate that a comprehensive data model should always be developed, with expert help, so that the end user can feel confident the subtleties of the data are fully understood. We then suggest that some pragmatic decisions can be made to simplify the model so that the end user can retain control over setting up and maintaining the application
- …